7.5
CWE
307 770
Advisory Published
CVE Published
Updated

CVE-2023-46745: Rate limiting Bypass on login page in libreNMS

First published: Fri Nov 17 2023(Updated: )

### Summary Application is using two login methods and one of them is using GET request for authentication. There is no rate limiting security feature at GET request or backend is not validating that. ### PoC Go to /?username=admin&password=password&submit= Capture request in Burpsuite intruder and add payload marker at password parameter value. Start the attack after adding your password list We have added 74 passwords Check screenshot for more info <img width="1241" alt="Screenshot 2023-11-06 at 8 55 19 PM" src="https://user-images.githubusercontent.com/31764504/280905148-42274f1e-f869-4145-95b4-71c0bffde3a0.png"> ### Impact An attacker can Bruteforce user accounts and using GET request for authentication is not recommended because certain web servers logs all requests in old logs which can also store victim user credentials.

Credit: security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
composer/librenms/librenms<23.11.0
23.11.0
Librenms Librenms<23.11.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-46745 about?

    CVE-2023-46745 is a vulnerability in the login page of libreNMS that allows bypassing rate limiting by using a GET request for authentication.

  • How does CVE-2023-46745 work?

    This vulnerability occurs because there is no rate limiting security feature in place for the GET request used for authentication.

  • What is the severity of CVE-2023-46745?

    CVE-2023-46745 has a severity score of 5.3, which is considered medium.

  • How can I fix CVE-2023-46745?

    To fix CVE-2023-46745, update to version 23.11.0 of libreNMS, which includes a remedy for this vulnerability.

  • What CWE categories are associated with CVE-2023-46745?

    CVE-2023-46745 is associated with the CWE categories 770 (Allocation of Resources Without Limits or Throttling) and 307 (Improper Restriction of Excessive Authentication Attempts).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203